Risk
11/29/2012
11:38 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

TrainACE Releases White Paper That Examines Notable Differences In CASP vs. CISSP Certifications

First publicized white paper explores two security certifications

GREENBELT, Md., Nov. 28, 2012 /PRNewswire/ -- TrainACE, a leading and internationally recognized provider of IT training, has ramped up their resources yet again. About a year ago TrainACE brought free cyber security training webinars to the public and now white papers have joined the free resources provided by this leading training organization. These white papers are written by TrainACE's own staff and subject matter experts who have years of training and experience in the fields which they write about. Topics are chosen by researching the most relevant and up-to-date areas being talked about by IT professionals. These important topics are then conceptualized and brought to industry professionals in easy to read, relevant, research style white papers.

The first publicized white paper explores two security certifications, CASP and CISSP. CompTIA's CASP is newly created and filled with the practical knowledge needed by cyber security professionals. Since it is so new, people are still pondering over whom the exam is best fit for and how it can be strategically placed into the IT certification puzzle. This particular white paper, "Examining the Notable Differences in CASP vs. CISSP", answers the questions many people have regarding the two certifications and explains how the exams actually work quite efficiently when paired hand-in-hand.

Be on the lookout for more topics to be added to the TrainACE White Paper page in the near future.

TrainACE is a renowned IT certification training leader. TrainACE has received international awards from many respected professional organizations that have recognized their commitment to training excellence. TrainACE is known as one of the few training vendors in the world that produces custom, five day, hands-on information assurance and advanced security classes. Many of these classes of which can be further customized and fitted to better accommodate the specific training needs of any organization or objective. TrainACE has proudly been training IT professionals since 2001. For more information about their white papers, free training webinars and training classes, visit their website http://www.trainace.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web